Cyber-Attacks: The Internal Threat

John Maddison, vice president of marketing products for Fortinet, says not all threat intelligence is created equally. While many businesses are doing better jobs than they were 12 to 16 months ago of sharing cyberthreat information with competitors and law enforcement, most continue to fall short when it comes to shoring up their own internal protections, he says.

In an interview recorded at RSA Conference 2015, Maddison discusses what businesses should be doing to ensure they are focused on mitigating the "real" threats that are putting their networks at risk, as well as:

The difference between external and internal cyber-intelligence and threat information sharing;

Why securing the perimeter gives organizations a false sense of security; and

Maddison has more than 20 years of experience in the telecommunication, IT infrastructure and security industries. Before Fortinet, he held positions as general manager of the data center division and senior vice president of core technology at Trend Micro. He also served as senior director of product management for Lucent Technologies.

About the Author

A veteran journalist with more than 20 years' experience, Kitten has covered the financial sector for the last 13 years. Before joining Information Security Media Group in 2010, where she now serves as director of global events content and executive editor of BankInfoSecurity and CUInfoSecurity, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.

Operation Success!

Risk Management Framework: Learn from NIST

From heightened risks to increased regulations, senior leaders at all levels are pressured to
improve their organizations' risk management capabilities. But no one is showing them how -
until now.

Learn the fundamentals of developing a risk management program from the man who wrote the book
on the topic: Ron Ross, computer scientist for the National Institute of Standards and
Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37
- the bible of risk assessment and management - will share his unique insights on how to:

Understand the current cyber threats to all public and private sector organizations;

Develop a multi-tiered risk management approach built upon governance, processes and
information systems;